General

  • Target

    6067a8f5cbe721502cd6e27aa9a1d270560bceb928426db024385426a5030a3e

  • Size

    935KB

  • Sample

    221125-pt9ltaca9s

  • MD5

    8223233adc44a99027fd0f6e6e1738c3

  • SHA1

    68a0476c5bc64a465f81f13c94c9d3d1bd8b0b8e

  • SHA256

    6067a8f5cbe721502cd6e27aa9a1d270560bceb928426db024385426a5030a3e

  • SHA512

    224a1a79a54d8396fdb38420ff8f5f7e106e486c6b2c5400b77128ccfe9c1e6fc310d40eef8087cde5c8ca33130a5c27d0a4f52ce9f7bc4ec9f31432799c3317

  • SSDEEP

    12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

Score
8/10
upx

Malware Config

Targets

    • Target

      6067a8f5cbe721502cd6e27aa9a1d270560bceb928426db024385426a5030a3e

    • Size

      935KB

    • MD5

      8223233adc44a99027fd0f6e6e1738c3

    • SHA1

      68a0476c5bc64a465f81f13c94c9d3d1bd8b0b8e

    • SHA256

      6067a8f5cbe721502cd6e27aa9a1d270560bceb928426db024385426a5030a3e

    • SHA512

      224a1a79a54d8396fdb38420ff8f5f7e106e486c6b2c5400b77128ccfe9c1e6fc310d40eef8087cde5c8ca33130a5c27d0a4f52ce9f7bc4ec9f31432799c3317

    • SSDEEP

      12288:Y5Yr15f753d5QWIDz/Wz9NCyzHinLipNDJ5eoFb0OZ/WiGaks+HL63S27x4:YyHv5Z+Wzv7AiBll0OBWi6si9G

    Score
    8/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks